Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Setting Active Directory


    Yes this is related to AD computer's, what setting do they need to become complaint for ISO 27002.

    I need all the specfic setting for both Linux and Windows. For example what file permissions like 600 for /etc/shadow file in linux and what registry setting do all the computers that all windows machines needs to be. I need specfic details for this. So when I conduct a pre-inspection I know what to look for.

     

    Answer:

    You need to be compliant with ISO 27001:2013, ISO 27002 is only a code of best practices, so you can only certify ISO 27001. To be compliant with ISO 27001 there are many requirements that you need to implement, but you can do it technically like you want. For example, the control of the Annex of ISO 27001:2013 "A.9.2.1 User registration and de-registration: A formal user registration and de-registration process shall be implemented to enable assignment of access rights”. You can implement it with Active Directory or OpenLdap, or any other LDAP software. The external auditor will verify if you have implemented the contr ol, and he can ask you how it is implemented (can also give you some tips to improve the control), but nothing more.
    Anyway, from my point of view permissions like 600 (or 400 for only read) for the /etc/shadow file in Linux is a best practice, although I think that can be better if you also encrypt the hard drive (and the same for Windows) and set a BIOS password.
    And if you have Linux and Windows systems, can be a good idea to add Linux systems to the Windows domain, and include Linux users in the AD. 
    Finally, remember that the Access Control Policy is a mandatory document in ISO 27001 (you can see the entire list of mandatory documents here “List of mandatory documents required by ISO 27001 (2013 revision)” : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/) , so maybe this template can be interesting for you (you can see a free version clicking on “Free Demo” tab) “Access Control Policy” : https://advisera.com/27001academy/documentation/access-control-policy/
  • IRCA or RABQSA


    I finally did the five day ISO 27001 Lead Auditor course in June in the UK with IT Governance (https://www.itgovernance.co.uk/) and passed.
    But I have just come to realise is that the course and my certificate is accredited by IBITGQ - the International Board for IT Governance Qualifications and not IRCA or RABQSA.

    What does this mean in terms of my certificate?

     

    Answer:

    This simply means that IRCA or RABQSA have more international presence and their accreditations are better valued, but anyway, from my point of view the important here is that you have passed the ISO 27001 Lead Auditor course. It is also important the entity that issues the certificate, but generally the knowledge that you learn in a course accredited by IBITGQ should be the same that the knowledge that you learn in a course accredited by IRAC or RABQSA. 
    This article can be interesting for you “Qualifications for an ISO 2700 1 Internal Auditor” : https://advisera.com/27001academy/blog/2015/03/30/qualifications-for-an-iso-27001-internal-auditor/
  • Costs of the implementation


    how to derive the budget required for the implementation?
     

    Answer:

    There are some possible parameters that you can consider for the implementation, for example cost of external assistance, cost of technology, cost of employees time, etc. This article can be interesting for you “How much does ISO 27001 implementation cost?” : https://advisera.com/27001academy/blog/2011/02/08/how-much-does-iso-27001-implementation-cost/
  • Updating existing information security policies


    Answer:

    ISO 27001 is not only about security policies, so this task can't be made just by improving your policies without doing the prior analysis. The whole logic of ISO 27001 is based on risk assessment, which means once you know where your risks are then you can start writing the documents and implement the controls that will mitigate those risks.

    If you're not particularly satisfied with your existing documents, than it might be easier to write completely new documents - in such case our templates will certainly help you.

    Here you'll find the details on this topic:

    The basic logic of ISO 27001: How does information security work? https://advisera.com/27001academy/knowledgebase/the-basic-logic-of-iso-27001-how-does-information-security-work/
    ISO 27001 implementation checklist https://advisera.com/27001academy/knowledgebase/iso-27001-implementation-checklist/
    List of mandatory documents required by ISO 27001 (2013 revision) https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/
    8 criteria to decide which ISO 27001 policies and procedures to write https://advisera.com/27001academy/blog/2014/07/28/8-criteria-to-decide-which-iso-27001-policies-and-procedures-to-write/
  • Mandatory documents


    There are some requirements of procedures in 114 controls in the standard. Do we really need to make procedures? because someone told me that procedures are not required for the new version of 27001. And please tell me, if i cannot involve all the employees of the department for filling of the risk assessment sheet, how can i do it myself?  who will be the asset owner and risk owner for people? (employees, contractors, visitors)

     

    Answer:

    Yes, there are some mandatory documents in ISO 27001:2013, including procedures, plans, policies, etc. For example is mandatory the Incident management procedure (clause A.16.1.5). Here you can see a list of mandatory documents (and also non-mandatory) “List of mandatory documents required by ISO 27001 (2013 revision)” : https://advisera.com/27001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-27001-2013-revision/ 
    You can perform the risk assessment by yourself, but you will need some information about the departments involved in the scope of the ISMS: assets, threats and vulnerab ilities, consequences and likelihood related to each asset. This article can be interesting for you “How to assess consequences and likelihood in ISO 27001 risk analysis” : https://advisera.com/27001academy/iso-27001-risk-assessment-treatment-management/#assessment And maybe this article can be also interesting for you “ISO 27001 risk assessment: How to match assets, threats and vulnerabilities” : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/
    Generally the asset owner can be for example an IT administrator, and the risk owner can be the head of the IT department. For more information about the risk owners and asset owners, please read this article “Risk owners vs. Asset owners in ISO 27001:2013” : https://advisera.com/27001academy/knowledgebase/risk-owners-vs-asset-owners-in-iso-270012013/
  • Roles and responsibilities


    How the people in this function get the specif task for doing the monitoring? I have two options: 
    1) They do it by themselves and they need to somehow capture it (I'm not sure what is the best way)
    2) Someone is about to 'give them' the task (again not sure how to capture it)
     

    Answer:

    I am not sure if I have understood the question, but from my point of view is better option 2), because on this way you can have 2 levels: manager (coordinates and plans the execution of all tasks) and technical expert (perform technically all tasks). The last can be useful for example for the change management (clause A.12.1.2 ISO 27001:2013): an user identifies changes, the manager analyze and approve them and requests to a technical expert to do the necessary changes.
    So from my point of view is very important to have clearly defined roles and responsibilities. These articles –related to information security and ISO 27001- can be interesting for you :
    “What is the job of Chief Information Security Officer (CISO) in ISO 27001?” : https://advisera.com/27001academy/knowledgebase/what-is-the-job-of-chief-information-security-officer-ciso-in-iso-27001/
    “Roles and responsibilities of top management in ISO 27001 and ISO 22301” : https://advisera.com/27001academy/blog/2014/06/09/roles-and-responsibilities-of-top-management-in-iso-27001-and-iso-22301/
    "How to perform monitoring and measurement in ISO 27001" : https://advisera.com/27001academy/blog/2015/06/08/how-to-perform-monitoring-and-measurement-in-iso-27001/
  • Template to write the Information Security Objectives and planning to achieve th


    is there a template to write information security objectives and planning to achieve them; I mean planning needs to be elaborated while objectives should be written for Organizations' high level directions. so how to combine these two conflicts ? that's what made me confused. 
     

    Answer:

    Yes, we have these templates, but before let me explain you some things: Usually objectives are set at two levels: 1) General ISMS level (for this you can use an Information Security Policy), and 2) Security controls (for this you can use the Statement of Applicability). So, for the point 1 you can use our template, you can see a free version clicking on “Free Demo” tab here “Information Security Policy” : https://advisera.com/27001academy/documentation/information-security-policy/
    And for the point 2, you can see also a free version of this “Statement of Applicability” : https://advisera.com/27001academy/documentation/statement-of-applicability/ 
    Regarding the Plan to achieve the objectives, you need the Risk Treatment plan, and you can also see a free version of our templete here “Risk Treatment Plan” : https://advisera.com/27001academy/documentation/risk-treatment-plan/ 
    Finally, this article can be also interesting for you “ISO 27001 control objectives – Why are they important?” : https://advisera.com/27001academy/blog/2012/04/10/iso-27001-control-objectives-why-are-they-important/
  • Questions about risk management


    I have some questions about information security management system. Thank you to answer these questions. I apologize for the lack of my english Writing

    1. What is information security risk management process? (process of risk management)
    2. What is the purpose and meaning of organize assets ? (organize assets)
    3. What are methods of valuation of assets? (assets evaluations method)
    4. what does the mean of  this concepts: threats, vulnerabilities, control, accident and consequences ?
    5. What is formula to calculate the risk?
    6. What is strategy to deal with the risk?
     

    Answers:

    1.- With the process of risk management, basically you can identify risks –related to information security- in your business and reduce them (with security controls). For more information about the process, please read this article “ISO 27001 risk assessment & treatment – 6 basic steps” : https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-treatment-6-basic-steps/
    2.- I suppose that your question is related to the inventory of assets, if so, the purpose and meaning of the inventory is to have identified and categorized all assets because they have a value for the business, and if you have based the risk management on assets, you can calculate risks related to them and protect them, although is not mandatory to perform the risk management based on assets, but is recommendable. This article can be interesting for you “How to handle Asset register (Asset inventory) according to ISO 27001” : https://advisera.com/27001academy/knowledgebase/how-to-handle-asset-register-asset-inventory-according-to-iso-27001/ 
    3.- Basically 3: quantitative, qualitative and semi-quantitative. 
    4.- threat: potential cause of an unwanted incident, which may result in harm to a system or organization; vulnerability: weakness of an asset or control that can be exploited by one or more threats; control: measure that is modifying risk; accident (is the same that an event): occurrence or change of a particular set of circumstances; consequence: outcome of an event affecting objectives.
    5.- Depends on the methodology of risk management, an example can be: Risk = Consequences + likelihood. This free webinar can be interesting for you “The basics of risk assessment and treatment according to ISO 27001” : https://advisera.com/27001academy/webinar/basics-risk-assessment-treatment-according-iso-27001-free-webinar-demand/
    6.- Basically you have 4 options: reduce, accept, avoid or transfer. This article can be interesting for you “Risk Treatment Plan and risk treatment process – What’s the difference?” : https://advisera.com/27001academy/iso-27001-risk-assessment-treatment-management/#treatment
  • Questionnaire before the implementation


    kindly provide me the questionnaire regarding 20000 & 27000 what all questions come before or queries before implementation of given standard
     

    Answer:

    I am not sure what you mean, but the questionnaire that you can use before the implementation of ISO 27001 or ISO 20000 is for a gap analysis. If your question is related to the gap, this free tool can be useful for you “Free ISO 27001 Gap Analysis Tool” : https://advisera.com/27001academy/free-iso-27001-gap-analysis-tool/ Or this one “Free ISO 20000 Gap Analysis Tool” : https://advisera.com/20000academy/itil-iso-20000-tools/iso-20000-gap-analysis-tool/
    Another important thing before the implementation is to have an implementation checklist, so this article can be interesting for you “ISO 27001 implementation checklist” : https://advisera.com/27001academy/knowledgebase/iso-27001-implementation-checklist/
    Or also this one “ISO 20000 Implementation Project Checklist (Word)” : https://advisera.com/20000academy/consultants/
    Finally, this article about ISO 27001 and ISO 20000 maybe can be interesting for you “How to implement ISO 27001 and ISO 20000 together” : https://advisera.com/27001academy/blog/2015/03/16/how-to-implement-iso-27001-and-iso-20000-together/
  • Auditors and certificates


    How determines the auditor if a certificates is granted or not?
     

    Answer:

    The certification will be granted if there are no major nonconformities, anyway the final decision or determination is not performed by the auditor. The auditor only perform the certification audit, develop a final report, and made an evaluation about the compliance of the company. After this, in accordance with ISO 17021 (Requirements for bodies providing audit and certification of management systems), "the certification body shall ensure that the persons or committees that make the certification or recertification decisions are different from those who carried out the audits.”
    Maybe this article can be interesting for you “How to get certified against ISO 27001?” : https://advisera.com/27001academy/blog/2010/02/15/how-to-get-certified-against-iso-27001/
    And also this one “Becoming ISO 27001 certified – How to prepare for certification audit” : https://advisera.com/27001academy/iso-27001-certification/
Page 1041-vs-13485 of 1127 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +